The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaoyun Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
    The Second-Preimage Attack on MD4. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:1-12 [Conf]
  2. Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
    Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:1-16 [Conf]
  3. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
    Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:17-36 [Conf]
  4. Xiaoyun Wang, Lizhen Yang, Kefei Chen
    SDD: Secure Distributed Diffusion Protocol for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:205-214 [Conf]
  5. Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu
    Cryptanalysis of the Hash Functions MD4 and RIPEMD. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:1-18 [Conf]
  6. Xiaoyun Wang, Hongbo Yu
    How to Break MD5 and Other Hash Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:19-35 [Conf]
  7. Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
    Cryptanalysis of the Full HAVAL with 4 and 5 Passes. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:89-110 [Conf]
  8. Xiaoyun Wang, Kefei Chen
    An efficient proxy signature scheme in home network DRM. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:191-196 [Conf]
  9. Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:167-177 [Conf]
  10. Dengguo Feng, Xiaoyun Wang
    Progress and Prospect of Some Fundamental Research on Information Security in China. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2006, v:21, n:5, pp:740-755 [Journal]
  11. Hongbo Yu, Xiaoyun Wang
    Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:206-226 [Conf]
  12. Haina Zhang, Xiaoyun Wang
    Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:227-238 [Conf]
  13. Xiaoyun Wang, James K. Mills
    A FEM Model for Active Vibration Control of Flexible Linkages. [Citation Graph (0, 0)][DBLP]
    ICRA, 2004, pp:4308-4313 [Conf]
  14. Xiaoyun Wang, James K. Mills
    Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform. [Citation Graph (0, 0)][DBLP]
    ICRA, 2005, pp:4327-4332 [Conf]
  15. Yuxin Su, Dong Sun, Lu Ren, Xiaoyun Wang, James K. Mills
    Nonlinear PD Synchronized Control for Parallel Manipulators. [Citation Graph (0, 0)][DBLP]
    ICRA, 2005, pp:1374-1379 [Conf]

  16. Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. [Citation Graph (, )][DBLP]


  17. Distinguishing and Second-Preimage Attacks on CBC-Like MACs. [Citation Graph (, )][DBLP]


  18. New Birthday Attacks on Some MACs Based on Block Ciphers. [Citation Graph (, )][DBLP]


  19. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. [Citation Graph (, )][DBLP]


  20. New Distinguishing Attack on MAC Using Secret-Prefix Method. [Citation Graph (, )][DBLP]


  21. Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP]


  22. Research on the tailoring automatic sub-bed system using algorithm. [Citation Graph (, )][DBLP]


  23. Dual-modal Control of Configuration-dependent Linkage Vibration in a Smart Parallel Manipulator. [Citation Graph (, )][DBLP]


  24. Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. [Citation Graph (, )][DBLP]


  25. New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. [Citation Graph (, )][DBLP]


  26. Active Flatness Control of Thermally Disturbed Membranes Using an Adaptive Genetic Algorithm. [Citation Graph (, )][DBLP]


  27. Some Mathematical Problems in Cryptanalysis. [Citation Graph (, )][DBLP]


  28. Modal Control Design of Configuration-Dependent Linkage Vibration in a Parallel Robot Through Experimental Identification. [Citation Graph (, )][DBLP]


  29. A Query Optimization Based on Semantic User Focus. [Citation Graph (, )][DBLP]


  30. An Improvement on the Model of Ontology-Based Semantic Similarity Computation. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002